Commit Graph

88 Commits (master)

Author SHA1 Message Date
Peaks dcf527fd86
Merge pull request #65 from BuffBaby253/master
SharkNetSniffer
2024-09-17 18:02:11 -04:00
BuffBaby253 6f8d44d068
Update payload.sh 2024-09-17 12:19:41 -07:00
BuffBaby253 cb64802ff5
Update payload.sh
added variable
2024-09-16 12:25:56 -07:00
BuffBaby253 26040becb0
Create payload.sh 2024-09-15 08:43:02 -07:00
BuffBaby253 4c5fdf62a1
Delete payloads/library/Wireshark PCAP Capture directory 2024-09-15 08:36:23 -07:00
Peaks 7a0f36f069
Merge pull request #40 from InfoSecREDD/patch-1
Adding Nmap w Discord & C2 Exfil to Library
2024-07-03 20:35:11 -04:00
REDD 1f51d93b6a
Update payload.sh 2024-07-03 17:33:05 -07:00
BuffBaby253 4d3431c2e4
Add files via upload 2024-01-11 21:27:04 -08:00
drapl0n 2387b783c1
adding SERIAL_WRITE 2022-06-17 19:09:01 +05:30
drapl0n 7b8f934388
uploading DOS payload 2022-06-07 21:22:18 +05:30
drapl0n 6b067babf7
uploaded SharkDOS 2022-06-07 21:20:10 +05:30
Unit98.1 1ad2dbedd6
Rename payload.txt to payload.sh 2022-05-04 06:19:12 +08:00
Unit98.1 172ba18baf
Create payload.txt 2022-05-04 06:16:12 +08:00
Darren Kitchen afecd52d27
Update payload.sh
Updated with SERIAL_WRITE for Shark Jack Cable
2022-04-20 11:52:09 -05:00
Darren Kitchen 27eb6353e4
Merge pull request #43 from TW-D/patch-1
Add On-Site Implant
2022-01-21 19:09:20 -06:00
Jules Bozouklian b3cf17c1f7
add tcpdump example + exfiltration via email (#52)
* add tcpdump example + exfiltration via email

* update for PR
2022-01-19 23:40:11 +00:00
Darren Kitchen 7114f3a702
Rename payloads/library/example/ms-teams-exfiltration/payload.sh to payloads/library/exfiltration/ms-teams-exfiltration/payload.sh 2022-01-19 13:21:51 -06:00
Darren Kitchen b7048f1da6
Rename payloads/library/example/ms-teams-exfiltration/README.md to payloads/library/exfiltration/ms-teams-exfiltration/README.md 2022-01-19 13:20:34 -06:00
jboz 842dfa90cd add exfiltration payload work with ms teams 2022-01-19 19:46:23 +01:00
Random is Resistance 2b04952cb6
Added -oA option for interessting host scan again, exfil for multiple scan results (#50)
* move -oA option to standart nmap scan

moving -oA option to generate files to the scan of the whole network, not just the interessting hosts. Since e.g. .xml files are more useful for discovery scans of a whole network.

* fix

fixed borken funktion

* Update payload.sh

* adding support for multiple nmaps with -oA option 

Re-added the -oA option for interessting hosts. With differing file name.

Support for multiple nmap scans producing output files via -oA option.
2021-12-14 23:11:30 +00:00
Random is Resistance 245b54384d
Moving -oA option to standard scan (#49)
* move -oA option to standart nmap scan

moving -oA option to generate files to the scan of the whole network, not just the interessting hosts. Since e.g. .xml files are more useful for discovery scans of a whole network.

* fix

fixed borken funktion
2021-12-14 00:19:51 +00:00
Random is Resistance b4340761ba
Adding nmaps -oA option to interessting hosts scan (#48)
Adding the -oA option of nmap to export results in useful formats and upload them to the C2 Cloud. For further use in a pentest.
2021-12-14 00:19:37 +00:00
cyb3rwr3ck 5e6bbc86d3
Fixing subnet confusion (#44)
Co-authored-by: fbu <fbuedenhoelzer@it-sec.de>
2021-09-24 17:19:21 +01:00
TW-D fec6c6a636
Add On-Site Implant
Uses a "Meterpreter Payload" for remote access via a reverse HTTP.
2021-09-09 15:07:10 -04:00
Darren Kitchen e768c62a84
Updated payload for SJC 2021-08-24 08:43:21 -05:00
monsieurmarc 1302d2cda7
Resubmitting for Payload Awards (#42)
* Payload based on example nmap payload but with pastebin ex-filtration

* Update payload.sh

* refine directory name to remove spaces

refine directory name to remove spaces
2021-07-06 20:00:27 +01:00
ar1k88 26047aa6fe
Update payload.sh 2021-01-22 04:25:13 -08:00
ar1k88 27a98cb46e
Create payload.sh 2021-01-22 02:41:35 -08:00
Idar Lund 7bd42f59ee
curl command fix 2021-01-14 22:15:06 +01:00
felinuxing 1c2f18313d
Create payload.sh (#36)
Telegram Bot + SharkJack
2020-09-14 12:40:47 +03:00
Darren Kitchen 9c5e003172
Merge pull request #30 from rcoemans/patch-10
Update readme.md
2020-08-21 16:28:51 -07:00
rcoemans 4e0850951a
Update readme.md
Added revision history table
2020-08-21 23:20:22 +02:00
rcoemans beb6ea4ece
Update readme.md
Added revision history table and updated document to script version 1.1
2020-08-21 23:18:35 +02:00
Darren Kitchen 73013b1c83
Merge pull request #29 from rcoemans/patch-9
Update restore.sh
2020-08-21 10:41:06 -07:00
Darren Kitchen 8488e7594f
Merge pull request #27 from rcoemans/patch-7
Update payload.sh
2020-08-21 10:40:54 -07:00
Darren Kitchen f7a8e70fcc
Merge pull request #25 from rcoemans/patch-5
Update readme.md
2020-08-21 10:40:44 -07:00
rcoemans 6885244529
Update restore.sh
Improved CHECK_INPUT_PARAM function a bit.
2020-08-21 15:23:24 +02:00
rcoemans 83dc8ea2c0
Update payload.sh
Added Stealth Mode and fixed LLDP attack function.
2020-08-21 15:05:56 +02:00
rcoemans 9959071f00
Update readme.md
Fixed some typo's and added Hak5 Forum Thread url.
2020-08-21 09:39:06 +02:00
rcoemans 9fc6ec944b
Update readme.md
Fixed some typo's and added Hak5 Forum Thread url.
2020-08-21 09:36:02 +02:00
rcoemans 0e190ca030
Network Recon framework payload with logging notification and exfiltration
Swiss knife network reconnaissance payload with options for SSH server, Cloud C2 exfiltration and led blinking for IP address, payload is based on various sample payloads from HAK5, MonsieurMarc, Topknot and others. This payload script has been organized in a way it is easy to be extended with additional recon (attack) functions.

The script has been created in a modular fashion which allows easy extending the script with new functions (e.g. recon, notification or exfiltration functions). The script furthermore incorporates logic to determine already existing loot folders and create a new (unique) loot folder every time the script is executed.
2020-08-20 21:30:12 +02:00
rcoemans ed82e9fad2
Backup and Restore scripts with logging and notification
Being tired of having to re-image your Shark Jack and going through the hassle of backing up and restoring the device? These shell scripts will help you to backup and restore all important data on your Shark Jack.

The scripts has been created in a modular fashion which allows easy extending the scripts with new functions. The backup script (`backup.sh`) incorporates logic to determine already existing backup folders and create a new (unique) backup folder every time the script is executed.
2020-08-20 21:27:44 +02:00
Darren Kitchen 205b13abb4
Update payload.sh 2020-07-14 08:48:38 -07:00
Darren Kitchen ac62eca388
Update payload.sh 2020-05-25 12:55:31 -07:00
deviant 1698a082c3
Update payload.sh 2020-05-20 19:33:41 -07:00
deviant d8be685b59
Add files via upload 2020-05-20 18:16:04 -07:00
Dan Goodman 7add983518 mac changer payload 2020-02-01 09:28:15 -05:00
Darren Kitchen 59817daf53
Merge pull request #12 from private-locker/master
Adding Nmap-C2 to Payloads Repo.
2020-01-16 13:26:05 -08:00
crdx a70ad92ac1
Update ssh-ip-blinker to work with 3-digit octets 2019-12-30 18:21:28 +00:00
Darren Kitchen 6d3a199536
Merge pull request #13 from woundride/master
netdiscover-passive-payload
2019-12-22 11:13:48 -08:00